Chinese APT hackers remotely controlling a victim.

Rating :

Comments

klevanat February 05,2015 @gmazur agreed on your point that companies need not rely on Government sources for information on hacker techniques. It might be that the private sector actually has greater flexibility for analysts to investigate attacks as they can utilize systems that are not on classified networks or as locked down. Of course that wouldn't help in strictly criminal cases and they don't always have the ability to track traffic after it leaves their network due to current laws or regulations.
It could be argued that FireEye will make out on out on that deal in the long run. Professional services have much higher margins than product sales :) though both are cool companies.

tristayifeiat February 09,2015It is an impressive video to me. The forensic and cybercrime are really new fields to me. I never paid any attention on either the back operation of computer itself or the hackers. Computers can be used in both good ways and bad ways. Although I still could not fully understand some of the new terms, this video does provide me some information about how hackers work with computers. I read the Mandiant report and Chinese news regarding this activity. Certainly, there were varieties of arguments. I would stand on the neutral point, since I do not think I had enough professional knowledge to express my opinion.When my parents and I messaging or wechatting, it only took two seconds. Internet really makes the world smaller. I think we should use computer and internet in a good way.

JSahm151at February 12,2015Very interesting to learn about this group, and the ways they gain access to a system. They can take control of one system and infect many others without anyone knowing. as well as uploading stolen files to a server for later use. This video also talked about spear fishing, a big problem in our society. Attackers can steal important information from many people at once. The issue is that people still fall for this kind of deception through fake emails that look authentic.

nbodykat February 13,2015It's very interesting to learn more about APT and how they operate in order to exploit users. They've used a variety of tools and spearphishing in order to gain access to information. It's interesting to note that the attackers tested the tools out on their own systems first prior to attacking a real victim. With all the education out there on methods of attacking users, you would think that people are less susceptible to spearphising. I know I get emails every day trying to scam me for money, click on a link to update bank information, or check out a link spoofing an email account from my contacts. I immediately delete these emails because I'm aware of the scams. What I find funny is the individuals who send me bank emails to a bank I don't even have an account with. Unfortunately, there are still many gullible people out there who will click on these links and fall for these attacks.

jczarnyat February 15,2015Very quick video detailing snapshots of ATP activity. Was interesting to see the progression from setting up dummy email accounts, using those accounts to spear phish, contacting compromised systems, and then offloading data to their own systems. I can see how a lot of intelligence could be derived from Mandiant continuously watching these actors. Hopefully the intelligence gathered can be used against the actors in the future/stop future APTs.